Sciweavers

1124 search results - page 129 / 225
» Hidden Market Design
Sort
View
DATE
2010
IEEE
147views Hardware» more  DATE 2010»
15 years 2 months ago
Detecting/preventing information leakage on the memory bus due to malicious hardware
An increasing concern amongst designers and integrators of military and defense-related systems is the underlying security of the individual microprocessor components that make up ...
Abhishek Das, Gokhan Memik, Joseph Zambreno, Alok ...
ASC
2007
14 years 12 months ago
Evolving an artificial neural network classifier for condition monitoring of rotating mechanical systems
We present the results of our investigation into the use of Genetic Algorithms (GAs) for identifying near optimal design parameters of diagnostic systems that are based on Artifici...
Abhinav Saxena, Ashraf Saad
SAC
2008
ACM
14 years 11 months ago
ECG data provisioning for telehomecare monitoring
The latest computer and communication technologies in combination with an enhanced ECG analysis system can be used to improve cardiac patient's follow-up out-of-hospital. In ...
Bernardo Gonçalves, José Gonç...
HPCC
2011
Springer
13 years 11 months ago
Achieving Performance and Availability Guarantees with Spot Instances
Abstract—In the Infrastructure-as-a-Service (IaaS) cloud computing market, spot instances refer to virtual servers that are rented via an auction. Spot instances allow IaaS provi...
Michele Mazzucco, Marlon Dumas
ICMI
2003
Springer
166views Biometrics» more  ICMI 2003»
15 years 5 months ago
Georgia tech gesture toolkit: supporting experiments in gesture recognition
Gesture recognition is becoming a more common interaction tool in the fields of ubiquitous and wearable computing. Designing a system to perform gesture recognition, however, can...
Tracy L. Westeyn, Helene Brashear, Amin Atrash, Th...